Malvertising Campaign Delivers Oyster/Broomstick Backdoor via SEO Poisoning and Trojanized Tools – Arctic Wolf

Malvertising Campaign Delivers Oyster/Broomstick Backdoor via SEO Poisoning and Trojanized Tools – Arctic Wolf

This article analyzes the recent activities of the ransomware group LockBit, highlighting their exploitation techniques and targeted industries. It also discusses the mitigation strategies organizations can implement to defend against LockBit attacks. #LockBit #Ransomware #CyberDefense

Keypoints

  • LockBit ransomware continues to evolve by integrating advanced evasion techniques and automated encryption processes.
  • The group primarily targets healthcare, manufacturing, and education sectors worldwide.
  • LockBit operators often gain initial access through compromised credentials and phishing campaigns.
  • Once inside, lateral movement and privilege escalation techniques are employed to maximize impact.
  • Data exfiltration before encryption has become a standard tactic to pressure victims into paying ransoms.
  • Organizations are advised to implement strong multi-factor authentication and regular system backups to mitigate risks.
  • Timely patching of vulnerabilities and employee cybersecurity training are critical components of defense.

MITRE Techniques

  • [T1078] Valid Accounts – LockBit operators used compromised credentials to access target networks, facilitating initial entry (‘initial access using valid credentials’).
  • [T1059] Command and Scripting Interpreter – Automated scripts were used for encryption and evasion purposes within compromised environments.
  • [T1087] Account Discovery – The group performed account enumeration to identify high-privilege users (‘discovery of accounts to escalate privileges’).
  • [T1041] Exfiltration Over C2 Channel – Data was exfiltrated via command and control channels before encryption (‘exfiltration of sensitive data prior to deployment of ransomware’).
  • [T1486] Data Encrypted for Impact – Files across networks were encrypted to disrupt operations and coerce ransom payments (‘encryption of data to impact victim’s operations’).

Indicators of Compromise

  • [Domains] Malicious domains used for phishing and C2 – lockbit-update[.]com, ransom-site[.]net
  • [File Names] Encrypted file extensions and ransom notes – .lockbit, README_LOCKBIT.txt

Read more: https://arcticwolf.com/resources/blog-uk/malvertising-campaign-delivers-oyster-broomstick-backdoor-via-seo-poisoning-and-trojanized-tools/